acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Cheating at Casinos with Hidden Cameras
From Schneier on Security

Cheating at Casinos with Hidden Cameras

Sleeve cameras aren't new, but they're now smaller than ever and the cheaters are getting more sophisticated: In January, at the newly opened $4-billion Cosmopolitan...

Movie-Plot Threat: Open Airplane Cockpit Doors During Bathroom Breaks
From Schneier on Security

Movie-Plot Threat: Open Airplane Cockpit Doors During Bathroom Breaks

James Fallows has a nice debunking of a movie-plot threat.

How Microsoft Develops Security Patches
From Schneier on Security

How Microsoft Develops Security Patches

I thought this was an interesting read.

Pseudonymity
From Schneier on Security

Pseudonymity

Long essay on the value of pseudonymity. From the conclusions: Here lies the huge irony in this discussion. Persistent pseudonyms aren't ways to hide who yoube...

Friday Squid Blogging: Squid Forks
From Schneier on Security

Friday Squid Blogging: Squid Forks

Squid forks.

Looking Backward at Terrorism
From Schneier on Security

Looking Backward at Terrorism

Nice essay on the danger of too much security: The great lie of the war on terror is not that we can sacrifice a little liberty for greater security. It is that...

The Dilemma of Counterterrorism Policy
From Schneier on Security

The Dilemma of Counterterrorism Policy

Any institution delegated with the task of preventing terrorism has a dilemma: they can either do their best to prevent terrorism, or they can do their best toA...

Steven Pinker on Terrorism
From Schneier on Security

Steven Pinker on Terrorism

It's almost time for a deluge of "Ten Years After 9/11" essays. Here's Steven Pinker: The discrepancy between the panic generated by terrorism and the deaths...

New Attack on AES
From Schneier on Security

New Attack on AES

"Biclique Cryptanalysis of the Full AES," by Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger. Abstract. Since Rijndael was chosen as the Advanced...

Alarm Geese
From Schneier on Security

Alarm Geese

A prison in Brazil uses geese as part of its alarm system. There's a long tradition of this. Circa 400 BC, alarm geese alerted a Roman citadel to a Gaul attack...

Security by Default
From Schneier on Security

Security by Default

Nice essay by Christopher Soghoian on why cell phone and Internet providers need to enable security options by default.

Search Redirection and the Illicit Online Prescription Drug Trade
From Schneier on Security

Search Redirection and the Illicit Online Prescription Drug Trade

Really interesting research. Search-redirection attacks combine several well-worn tactics from black-hat SEO and web security. First, an attacker identifies high...

New, Undeletable, Web Cookie
From Schneier on Security

New, Undeletable, Web Cookie

A couple of weeks ago Wired reported the discovery of a new, undeletable, web cookie: Researchers at U.C. Berkeley have discovered that some of the net’s mostfinally...

Interview with Me
From Schneier on Security

Interview with Me

Here's an interview with me from the Homeland Security News Wire.

Friday Squid Blogging: Giant Squid Painted on Canal Narrowboat
From Schneier on Security

Friday Squid Blogging: Giant Squid Painted on Canal Narrowboat

Pretty. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

<i>Liars and Outliers</i> Cover
From Schneier on Security

Liars and Outliers Cover

My new book, Liars and Outliers, has a cover. Publication is still scheduled for the end of February -- in time for the RSA Conference -- assuming I finish the...

Rat that Applies Poison to its Fur
From Schneier on Security

Rat that Applies Poison to its Fur

The African crested rat applies tree poison to its fur to make itself more deadly. The researchers made their discovery after presenting a wild-caught crestedAcokanthera...

Counterfeit Pilot IDs and Uniforms Will Now Be Sufficient to Bypass Airport Security
From Schneier on Security

Counterfeit Pilot IDs and Uniforms Will Now Be Sufficient to Bypass Airport Security

This seems like a really bad idea: ...the Transportation Security Administration began a program Tuesday allowing pilots to skirt the security-screening process...

Security Flaws in Encrypted Police Radios
From Schneier on Security

Security Flaws in Encrypted Police Radios

"Why (Special Agent) Johnny (Still) Can

GPRS Hacked
From Schneier on Security

GPRS Hacked

Just announced: Nohl's group found a number of problems with GPRS. First, he says, lax authentication rules could allow an attacker to set up a fake cellular base...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account